URL:

https://eshare.app/

Full analysis: https://app.any.run/tasks/76c872da-91c1-4e8f-87df-8d7c12be9e07
Verdict: Malicious activity
Analysis date: November 08, 2024, 08:35:28
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MD5:

EB0D4A43E4A5B2FDBA9DFE5C9830EAB2

SHA1:

0A08DF6577E5CB028B7169A10E5A6CA18D570BA3

SHA256:

AC54FB73F45BAD76D6FCA76F48F837CFB56D00AB7CCBD2177F73113909E7E612

SSDEEP:

3:N8bw/K:2cC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • EShareClient_v7.5.1015.exe (PID: 7696)
      • VirtualAudioCable.exe (PID: 7384)
      • EShareCamera.exe (PID: 7496)
      • EDisplayDriverInstall.exe (PID: 6212)
    • The process drops C-runtime libraries

      • EShareClient_v7.5.1015.exe (PID: 7696)
    • Process drops legitimate windows executable

      • EShareClient_v7.5.1015.exe (PID: 7696)
      • VirtualAudioCable.exe (PID: 7384)
      • EShareCamera.exe (PID: 7496)
      • EDisplayDriverInstall.exe (PID: 6212)
    • Drops a system driver (possible attempt to evade defenses)

      • VirtualAudioCable.exe (PID: 7384)
      • devcon.exe (PID: 7372)
      • drvinst.exe (PID: 7504)
      • drvinst.exe (PID: 7184)
      • EShareCamera.exe (PID: 7496)
      • devcon.exe (PID: 7564)
      • drvinst.exe (PID: 7692)
      • drvinst.exe (PID: 1332)
    • Executable content was dropped or overwritten

      • EShareClient_v7.5.1015.exe (PID: 7696)
      • VirtualAudioCable.exe (PID: 7384)
      • devcon.exe (PID: 7372)
      • drvinst.exe (PID: 7184)
      • drvinst.exe (PID: 7504)
      • EShareCamera.exe (PID: 7496)
      • drvinst.exe (PID: 7692)
      • RemoteControlService.exe (PID: 7852)
      • devcon.exe (PID: 7564)
      • drvinst.exe (PID: 1332)
      • EDisplayDriverInstall.exe (PID: 6212)
      • devcon.exe (PID: 7524)
      • drvinst.exe (PID: 7556)
      • drvinst.exe (PID: 7200)
    • Executes as Windows Service

      • ESystemRemoteService.exe (PID: 7892)
      • WUDFHost.exe (PID: 3860)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 7352)
      • cmd.exe (PID: 7652)
      • cmd.exe (PID: 7872)
      • cmd.exe (PID: 6852)
      • cmd.exe (PID: 4808)
      • cmd.exe (PID: 8144)
      • cmd.exe (PID: 7276)
      • cmd.exe (PID: 3740)
    • Uses NETSH.EXE to delete a firewall rule or allowed programs

      • EShareClient_v7.5.1015.exe (PID: 7696)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • EShareClient_v7.5.1015.exe (PID: 7696)
    • Starts CMD.EXE for commands execution

      • EShare.exe (PID: 7324)
      • EShare.exe (PID: 2056)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 2576)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2576)
    • Manual execution by a user

      • EShare.exe (PID: 2056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
239
Monitored processes
92
Malicious processes
4
Suspicious processes
3

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs eshareclient_v7.5.1015.exe no specs eshareclient_v7.5.1015.exe msiexec.exe no specs msiexec.exe no specs audiolistenserver.exe virtualaudiocable.exe devcon.exe conhost.exe no specs drvinst.exe drvinst.exe esharecamera.exe devcon.exe conhost.exe no specs drvinst.exe drvinst.exe sppextcomobj.exe no specs slui.exe remotecontrolservice.exe esystemremoteservice.exe no specs edesktop.exe no specs edisplaydriverinstall.exe devcon.exe no specs conhost.exe no specs devcon.exe no specs conhost.exe no specs devcon.exe conhost.exe no specs drvinst.exe drvinst.exe wudfhost.exe no specs netsh.exe no specs conhost.exe no specs netsh.exe no specs conhost.exe no specs eshare.exe cmd.exe no specs conhost.exe no specs netstat.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs netstat.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs netstat.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs netstat.exe no specs findstr.exe no specs chrome.exe no specs eshare.exe cmd.exe no specs conhost.exe no specs netstat.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs netstat.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs netstat.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs netstat.exe no specs findstr.exe no specs chrome.exe no specs chrome.exe no specs slui.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
528netstat -aonC:\Windows\SysWOW64\NETSTAT.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Netstat Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netstat.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
612"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=122.0.6261.70 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffbc1ebdc40,0x7ffbc1ebdc4c,0x7ffbc1ebdc58C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
640"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5228 --field-trial-handle=1928,i,8553821214885531320,17417805602671419265,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
764netstat -aonC:\Windows\SysWOW64\NETSTAT.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Netstat Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netstat.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1332DrvInst.exe "2" "211" "ROOT\CAMERA\0000" "C:\WINDOWS\INF\oem6.inf" "oem6.inf:c14ce8840bf75614:EShareCamera.NTamd64:22.19.47.461:esharecamera," "44e8d2813" "00000000000001D0"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
1432"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=3532 --field-trial-handle=1928,i,8553821214885531320,17417805602671419265,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1744\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1884"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5284 --field-trial-handle=1928,i,8553821214885531320,17417805602671419265,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2056"C:\Program Files (x86)\EShare\EShare.exe" C:\Program Files (x86)\EShare\EShare.exe
explorer.exe
User:
admin
Company:
EShare Technology Co., Ltd.
Integrity Level:
MEDIUM
Version:
7.5.1015
Modules
Images
c:\program files (x86)\eshare\eshare.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2376\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
34 148
Read events
32 668
Write events
1 453
Delete events
27

Modification events

(PID) Process:(2576) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2576) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2576) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2576) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(2576) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(7496) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
010000000000000073867B34B931DB01
(PID) Process:(7696) EShareClient_v7.5.1015.exeKey:HKEY_CURRENT_USER\SOFTWARE\EShare
Operation:writeName:audio
Value:
true
(PID) Process:(7384) VirtualAudioCable.exeKey:HKEY_CURRENT_USER\SOFTWARE\EShare
Operation:writeName:EShare Audio
Value:
true
(PID) Process:(7372) devcon.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
Operation:writeName:setupapi.dev.log
Value:
4096
(PID) Process:(7504) drvinst.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EShareAudio
Operation:writeName:Owners
Value:
oem1.inf
Executable files
67
Suspicious files
254
Text files
53
Unknown types
7

Dropped files

PID
Process
Filename
Type
2576chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF8c0d8.TMP
MD5:
SHA256:
2576chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
2576chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old~RF8c0d8.TMP
MD5:
SHA256:
2576chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF8c0e7.TMP
MD5:
SHA256:
2576chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
2576chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
2576chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF8c0d8.TMP
MD5:
SHA256:
2576chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
2576chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF8c0d8.TMP
MD5:
SHA256:
2576chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
33
TCP/UDP connections
78
DNS requests
45
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6944
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
8160
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8160
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6736
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS00MGQ5LTgyNjAtN2FlY2ZjMDg0NmNj/1.0.0.17_llkgjffcdpffmhiakmfcdcblohccpfmo.crx
unknown
whitelisted
1204
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
696
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6736
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS00MGQ5LTgyNjAtN2FlY2ZjMDg0NmNj/1.0.0.17_llkgjffcdpffmhiakmfcdcblohccpfmo.crx
unknown
whitelisted
6736
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/actfcfanl4hq5aaxnnweccjxua6q_2024.11.6.1/jflhchccmppkfebkiaminageehmchikm_2024.11.06.01_all_d2akwhkoj6sq4ks6ia5rwrikha.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
7060
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4360
SearchApp.exe
2.23.209.139:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
239.255.255.250:1900
whitelisted
74.207.254.152:443
eshare.app
Linode, LLC
US
malicious
142.251.5.84:443
accounts.google.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 142.250.184.238
whitelisted
www.bing.com
  • 2.23.209.139
  • 2.23.209.150
  • 2.23.209.133
  • 2.23.209.137
  • 2.23.209.142
  • 2.23.209.144
  • 2.23.209.140
  • 2.23.209.149
  • 2.23.209.141
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
eshare.app
  • 74.207.254.152
malicious
accounts.google.com
  • 142.251.5.84
whitelisted
dl.eshare.app
  • 135.125.133.29
malicious
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
www.google.com
  • 142.250.184.228
whitelisted

Threats

No threats detected
Process
Message
AudioListenServer.exe
Audiooutput name is "{0.0.0.00000000}.{9a7a2494-d921-4b91-8899-38d44cd79857}"
AudioListenServer.exe
Audiooutput name is? "{0.0.1.00000000}.{05b02c95-c55a-499c-a533-120810b973df}"
AudioListenServer.exe
pDefaultDeviceName "2- Realtek AC'97 Audio"
AudioListenServer.exe
Audiooutput friendName is "2- Realtek AC'97 Audio"
AudioListenServer.exe
false
AudioListenServer.exe
************ "2- Realtek AC'97 Audio"
AudioListenServer.exe
SetDefaultAudioPlaybackDevice false "2- Realtek AC'97 Audio"
AudioListenServer.exe
Audiooutput name is "{0.0.1.00000000}.{05b02c95-c55a-499c-a533-120810b973df}"
AudioListenServer.exe
Audiooutput name is? "{0.0.1.00000000}.{a14f8bf5-56e3-412d-af34-d2240261ed67}"
AudioListenServer.exe
Audiooutput name is "{0.0.0.00000000}.{9a7a2494-d921-4b91-8899-38d44cd79857}"